Get out of the office, look around, and get a fresh perspective on protecting employees, assets, and data
Microsoft refuted claims on Thursday that an information disclosure leak in its Internet Explorer browser poses a privacy risk, arguing that the company publicizing the issue is seeking to put its competitors in an unfavorable light.
Some of the distributed denial-of-service (DDoS) attacks that targeted the websites of U.S. financial institutions this week have peaked at 60 Gbps, according to researchers from DDoS mitigation provider Arbor Networks.
Project Blitzkrieg, a coordinated attack against U.S. banking customers allegedly planned for the spring of 2013, is a real and credible threat, security researchers at McAfee have said.
European lawmakers want to stop exports of technology that can censor information to repressive regimes.
Microsoft has launched a new anti-piracy campaign in China, which intends to highlight the security risks of buying counterfeit software.
Japanese police are looking for an individual who can code in C#, uses a "Syberian Post Office" to make anonymous posts online, and knows how to surf the web without leaving any digital tracks -- and they're willing to pay.
Some advertising analytics companies are using a vulnerability in Microsoft's Internet Explorer browser for a questionable edge in figuring out if web users are actually seeing display advertisements buried within web pages.
Google has changed the way it handles image searches so that pornographic pictures are less likely to be presented to those who aren't looking for them.
Oracle is simplifying its security offerings by combining a pair of existing tools into a single package.
Adobe released security updates for its Flash Player and ColdFusion products on Tuesday in order to address critical vulnerabilities that could give attackers control over the affected computers.
U.S. law enforcement agencies with the help of Facebook have arrested 10 persons from various countries in connection with international cybercrime rings that targeted users on the social network.
A marketplace where security researchers can sell details on software bugs said it was compromised on Tuesday due to an "embarrassing oversight" that left its web server vulnerable.
If you're watching TV and the channel suddenly changes, you may not have sat on the remote control by accident.
In-Q-Tel, the technology investment arm of the U.S. Central Intelligence Agency (CIA), will invest in Tyfone, a small developer of mobile banking, identity management and near-field communication systems.
Most Popular Reviews
- 1 Samsung SUHD smart TV (JS9500) review
- 2 Samsung Galaxy S6 (32GB) review: Simply, the best Samsung Galaxy
- 3 LG 55-inch curved OLED (55EC930T) TV review: The future of OLED is bright
- 4 HTC One (M9) review: The weakest One in the trilogy
- 5 Google Nexus 9 review: The best of Google and HTC
Join the Good Gear Guide newsletter!
Best Deals on GoodGearGuide
Latest News Articles
- Microsoft aims to increase confidence in cloud services with better networking
- The Internet of Things to take a beating in DefCon hacking contest
- The Upload: Your tech news briefing for Wednesday, May 6
- EU launches antitrust probe into e-commerce sector
- Google launches a service for storing big data
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.